Vulnerabilities > CVE-2003-1067 - Local Security vulnerability in RETIRED: Oracle Solaris
Attack vector
LOCAL Attack complexity
LOW Privileges required
NONE Confidentiality impact
COMPLETE Integrity impact
COMPLETE Availability impact
COMPLETE Summary
Multiple buffer overflows in the (1) dbm_open function, as used in ndbm and dbm, and the (2) dbminit function in Solaris 2.6 through 9 allow local users to gain root privileges via long arguments to Xsun or other programs that use these functions.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 8 |
Nessus
NASL family Solaris Local Security Checks NASL id SOLARIS8_150863.NASL description Vulnerability in the Solaris component of Oracle and Sun Systems Products Suite (subcomponent: Localization (L10N)). Supported versions that are affected are 8 and 9. Easily exploitable vulnerability requiring logon to Operating System. Successful attack of this vulnerability can result in unauthorized Operating System takeover including arbitrary code execution. Note: Applies only when Solaris is running on SPARC platform. last seen 2020-06-01 modified 2020-06-02 plugin id 72144 published 2014-01-27 reporter This script is Copyright (C) 2014-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/72144 title Solaris 8 (sparc) : 150863-01 code # # (C) Tenable Network Security, Inc. # # The descriptive text in this plugin was # extracted from the Oracle SunOS Patch Updates. # include("compat.inc"); if (description) { script_id(72144); script_version("1.3"); script_cvs_date("Date: 2018/07/30 15:31:32"); script_cve_id("CVE-2003-1067", "CVE-2013-1067"); script_bugtraq_id(7991); script_name(english:"Solaris 8 (sparc) : 150863-01"); script_summary(english:"Check for patch 150863-01"); script_set_attribute( attribute:"synopsis", value:"The remote host is missing Sun Security Patch number 150863-01" ); script_set_attribute( attribute:"description", value: "Vulnerability in the Solaris component of Oracle and Sun Systems Products Suite (subcomponent: Localization (L10N)). Supported versions that are affected are 8 and 9. Easily exploitable vulnerability requiring logon to Operating System. Successful attack of this vulnerability can result in unauthorized Operating System takeover including arbitrary code execution. Note: Applies only when Solaris is running on SPARC platform." ); script_set_attribute( attribute:"see_also", value:"https://getupdates.oracle.com/readme/150863-01" ); script_set_attribute( attribute:"solution", value:"You should install this patch for your system to be up-to-date." ); script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/o:sun:solaris"); script_set_attribute(attribute:"patch_publication_date", value:"2013/11/07"); script_set_attribute(attribute:"plugin_publication_date", value:"2014/01/27"); script_set_attribute(attribute:"vuln_publication_date", value:"2003/06/20"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2014-2018 Tenable Network Security, Inc."); script_family(english:"Solaris Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/Solaris/showrev"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("solaris.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (solaris_check_patch(release:"5.8", arch:"sparc", patch:"150863-01", obsoleted_by:"", package:"SUNWhbcp", version:"8.0,REV=1999.10.12.16.26") < 0) flag++; if (solaris_check_patch(release:"5.8", arch:"sparc", patch:"150863-01", obsoleted_by:"", package:"SUNWcbcp", version:"8.0,REV=1999.10.12.16.33") < 0) flag++; if (solaris_check_patch(release:"5.8", arch:"sparc", patch:"150863-01", obsoleted_by:"", package:"SUNWkbcp", version:"8.0,REV=1999.10.12.16.19") < 0) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:solaris_get_report()); else security_hole(0); exit(0); } audit(AUDIT_HOST_NOT, "affected");
NASL family Solaris Local Security Checks NASL id SOLARIS9_113911.NASL description Vulnerability in the Solaris component of Oracle and Sun Systems Products Suite (subcomponent: Localization (L10N)). Supported versions that are affected are 8 and 9. Easily exploitable vulnerability requiring logon to Operating System. Successful attack of this vulnerability can result in unauthorized Operating System takeover including arbitrary code execution. Note: Applies only when Solaris is running on SPARC platform. last seen 2020-06-01 modified 2020-06-02 plugin id 72147 published 2014-01-27 reporter This script is Copyright (C) 2014-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/72147 title Solaris 9 (sparc) : 113911-02 code # # (C) Tenable Network Security, Inc. # # The descriptive text in this plugin was # extracted from the Oracle SunOS Patch Updates. # include("compat.inc"); if (description) { script_id(72147); script_version("1.3"); script_cvs_date("Date: 2018/07/30 15:31:32"); script_cve_id("CVE-2003-1067", "CVE-2013-1067"); script_bugtraq_id(7991); script_name(english:"Solaris 9 (sparc) : 113911-02"); script_summary(english:"Check for patch 113911-02"); script_set_attribute( attribute:"synopsis", value:"The remote host is missing Sun Security Patch number 113911-02" ); script_set_attribute( attribute:"description", value: "Vulnerability in the Solaris component of Oracle and Sun Systems Products Suite (subcomponent: Localization (L10N)). Supported versions that are affected are 8 and 9. Easily exploitable vulnerability requiring logon to Operating System. Successful attack of this vulnerability can result in unauthorized Operating System takeover including arbitrary code execution. Note: Applies only when Solaris is running on SPARC platform." ); script_set_attribute( attribute:"see_also", value:"https://getupdates.oracle.com/readme/113911-02" ); script_set_attribute( attribute:"solution", value:"You should install this patch for your system to be up-to-date." ); script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/o:sun:solaris"); script_set_attribute(attribute:"patch_publication_date", value:"2013/11/15"); script_set_attribute(attribute:"plugin_publication_date", value:"2014/01/27"); script_set_attribute(attribute:"vuln_publication_date", value:"2003/06/20"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2014-2018 Tenable Network Security, Inc."); script_family(english:"Solaris Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/Solaris/showrev"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("solaris.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (solaris_check_patch(release:"5.9", arch:"sparc", patch:"113911-02", obsoleted_by:"", package:"SUNWcbcp", version:"9.0,REV=2001.11.06.10.49") < 0) flag++; if (solaris_check_patch(release:"5.9", arch:"sparc", patch:"113911-02", obsoleted_by:"", package:"SUNWkbcp", version:"9.0,REV=2001.11.06.10.42") < 0) flag++; if (solaris_check_patch(release:"5.9", arch:"sparc", patch:"113911-02", obsoleted_by:"", package:"SUNWhbcp", version:"9.0,REV=2001.11.06.10.45") < 0) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:solaris_get_report()); else security_hole(0); exit(0); } audit(AUDIT_HOST_NOT, "affected");
References
- http://secunia.com/advisories/9088/
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-55420-1
- http://www.ciac.org/ciac/bulletins/n-108.shtml
- http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html
- http://www.securityfocus.com/bid/64758
- http://www.securityfocus.com/bid/7991
- https://exchange.xforce.ibmcloud.com/vulnerabilities/12379